{"title":"A method of implementing transmission zeros by partial irises in filter design","authors":"Fu Luo, Yonglun Luo, Peiwei Liu, Zhihong Zhang","doi":"10.1109/ICCT.2010.5689315","DOIUrl":"https://doi.org/10.1109/ICCT.2010.5689315","url":null,"abstract":"An iris band-reject element used to produce the transmission zero (TZ) in a waveguide bandpass filter is proposed and analyzed. This element is an partial iris in a rectangular waveguide. It's found that the partial iris with certain height can produce a proper TZ and it can be applied in filter design to improve the stopband's performance. An improved waveguide type bandpass filter of Ka band with the band-reject irises is simulated and fabricated. The measured data shows very good agreement with the simulated one, and is presented.","PeriodicalId":253478,"journal":{"name":"2010 IEEE 12th International Conference on Communication Technology","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124997820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yun Chen, Xiang Chen, Yifei Zhao, Chunhui Zhou, Jing Wang
{"title":"Design and implementation of multi-mode QC-LDPC decoder","authors":"Yun Chen, Xiang Chen, Yifei Zhao, Chunhui Zhou, Jing Wang","doi":"10.1109/ICCT.2010.5688680","DOIUrl":"https://doi.org/10.1109/ICCT.2010.5688680","url":null,"abstract":"Low-density parity-check (LDPC) codes are one of the most effective error controlling methods, which now are widely used in multiple communication systems, for example, DVB-S2, 802.16e, etc. In these communication standards, the adopted LDPC codes are all quasi-cyclic low-density parity-check (QC-LDPC) codes. The parity-check matrices of QC-LDPC codes consist of arrays of circulants, in which each row is the cyclic shift of the row above it, and the first row is the cyclic shift of the last row. This character of QC-LDPC codes results in the linear encoding complexity and opens the door for the multi-mode LDPC decoders with enough flexibility of resource multiplexing. Based on the quasi-cyclic character of QC-LDPC codes, a design method for multi-mode QC-LDPC decoders is proposed in this paper. The node memory is skillfully organized and can be expediently addressed by a simple control unit to save memory consumption in hardware implementation. Then this design method is implemented and test on Field Programmable Gate Array (FPGA) platform. The test results show that the resource occupied by the multi-mode decoder is only a little more than that of maximal resource occupied by the single-mode decoder, and this multi-mode decoder can support at least 3 code rates with the throughput higher than 100Mbps when the iteration number is fixed to 12 and the clock frequency is set to 200MHZ.","PeriodicalId":253478,"journal":{"name":"2010 IEEE 12th International Conference on Communication Technology","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130912640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A learner based on neural network for cognitive radio","authors":"Xu Dong, Ying Li, Chun Wu, Yueming Cai","doi":"10.1109/ICCT.2010.5688723","DOIUrl":"https://doi.org/10.1109/ICCT.2010.5688723","url":null,"abstract":"Intelligence is a very important characteristic for cognitive radios (CR). Design of cognitive engine and application of artificial intelligence (AI) techniques are key to the implementation of this characteristic. Machine learning is one of the disciples in AI. This paper will propose a scheme of cognitive engine design, and use a learning algorithm based on neural network (NN) to implement a learner in the cognitive engine. A multilayer perceptron (MLP) neural network model will be introduced to ensure the convergence of the network, and problems on stop condition and overfitting will also be discussed. Finally, performance of the algorithm will be analyzed by simulations.","PeriodicalId":253478,"journal":{"name":"2010 IEEE 12th International Conference on Communication Technology","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122418958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Algorithm of image information hiding based on new anti-Arnold transform and Blending in DCT domain","authors":"Jie Yang","doi":"10.1109/ICCT.2010.5689227","DOIUrl":"https://doi.org/10.1109/ICCT.2010.5689227","url":null,"abstract":"Traditional Arnold transform is used widely in information hiding technology, but because of its long transform periodicity, it costs large time and computation memory. This paper introduces an new anti-Arnold transform algorithm, which reduces iterative times of anti-transform. With the combination of image blending, discrete cosine transform and new anti-Arnold transform, an algorithm based on the three technologies is proposed. Experimental result shows that the algorithm has good imperceptibility and validity, it also has certain degree of robustness under some common noise and spiteful attack.","PeriodicalId":253478,"journal":{"name":"2010 IEEE 12th International Conference on Communication Technology","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121154994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An approach to assessment modeling and system designing of risk management in EIP","authors":"Shin-Jer Yang, Yung-Ming Hsieh, Yu-Lung Lin","doi":"10.1109/ICCT.2010.5688648","DOIUrl":"https://doi.org/10.1109/ICCT.2010.5688648","url":null,"abstract":"Today, the Internet technology development and their applications have become increasingly popular. Hence, the WWW technology brings the rising of Enterprise Information Portal (EIP). However, providing a secure Enterprise Information Portal is one of essential quality of services (QoS) in Internet applications. Focusing on the security of EIP, the purposes of this paper are to find out various risk facets based on ISO 27001 reference standards and the ISMS process and also utilize AHP model to validate the factors of each risk facet. It will refine and validate required factors of each risk facet through experts specialized in designing and implementing a secure EIP system. Then, we will establish a risk management assessment model of EIP and design its algorithm. Finally, we develop an evaluation system and also perform experiments to verify and validate the risk management of EIP. According to the risk value, it will refine the risk level to verify and validate the security of EIP. According to the experimental result, our proposed assessment model and evaluation system of EIP risk management can be served as the guidelines of implementing any a secure Web application.","PeriodicalId":253478,"journal":{"name":"2010 IEEE 12th International Conference on Communication Technology","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122276559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A fast neighbor discovery algorithm for cognitive radio ad hoc networks","authors":"Zhang Jian-zhao, Zhao Hang-sheng, Yao Fu-qiang","doi":"10.1109/ICCT.2010.5688847","DOIUrl":"https://doi.org/10.1109/ICCT.2010.5688847","url":null,"abstract":"Cognitive radio (CR) is a revolution in wireless communication and CR ad hoc network(CRAHN) is under extensive research recently. In CRAHN, no control network infrastructure can be utilized and CR users have to attain the first hand information for networking. Neighbor discovery is a fundamental work for cooperation among CR users. This paper addresses the distributed neighbor discovery in CRAHNs. A fast neighbor discovery algorithm based on the available channel comparability among neighboring nodes is proposed. The algorithm makes use of data transceiver to accelerate the discovery process without increasing hardware requirement for CR users. The correctness and efficiency of the algorithm is proved through analysis as well as simulation.","PeriodicalId":253478,"journal":{"name":"2010 IEEE 12th International Conference on Communication Technology","volume":"248 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116413974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimization of base station coordination and power allocation in cellular networks downlink","authors":"P. Baracca, S. Tomasin, N. Benvenuto","doi":"10.1109/ICCT.2010.5689200","DOIUrl":"https://doi.org/10.1109/ICCT.2010.5689200","url":null,"abstract":"Base station (BS) coordination is a promising technique to improve the downlink throughput of cellular systems. However, limitations of both backhaul rate and computation capabilities of BSs pose a limit on the practically achievable downlink throughput. In this paper we propose a technique to select a sub-set of BSs serving each mobile terminal in order to limit the required backhaul information exchange. Moreover, both transmit power at each BS and beamforming are optimized in order to achieve the maximum network throughput. Numerical results show the merits of the proposed approach when compared against existing techniques, lowering the backhaul rate requirement by about 66% for an almost insignificant reduction of the system throughput.","PeriodicalId":253478,"journal":{"name":"2010 IEEE 12th International Conference on Communication Technology","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126782332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"New dual-mode microstrip bandpass Filter with a Square Notch","authors":"S. Li, Hong-tao Cai, Wei Wu, Ying Li, Zi-he Wang","doi":"10.1109/ICCT.2010.5688951","DOIUrl":"https://doi.org/10.1109/ICCT.2010.5688951","url":null,"abstract":"A new planar dua1-mode microstrip bandpass filter with a square notch is proposed. The proposed filter structure uses a single patch without coupling gaps. This filter has two transmission zeros on both sides of the passband. The insertion loss is < 1dB and return loss is > l0dB within 1.96–2.13GHz, and the minimum insertion loss is 0.07dB at about 2.05GHz. The 3dB fractional bandwidth is 12.73%. The effect on the filter's performance by changing filter parameters is studied. The results show that this new filter can provide a low insertion loss and reduce uncertainty in fabrication. It also makes miniaturization easy.","PeriodicalId":253478,"journal":{"name":"2010 IEEE 12th International Conference on Communication Technology","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126944731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A design of wireless temperature and humidity monitoring system","authors":"Lei Xu, Hongwei Zhang, Xiaohui Li, Xian-Liang Wu","doi":"10.1109/ICCT.2010.5688998","DOIUrl":"https://doi.org/10.1109/ICCT.2010.5688998","url":null,"abstract":"The existing data sampling schemes can not update ROM serial numbers of DS18B20 automatically and locate DS18B20s accurately. For these reasons above, it is difficult to replace the faulty DS18B20s immediately. To solve this problem, both I/O (Input/Output) ports number of MCU (Micro Controller Unit) and the value of temperature alarm trigger registers (TH and TL) are used to determine the storage address of ROM serial numbers in 24LC256, and are also used to adopted as the physical address of DS18B20. Consequently, automatic updating of ROM (Read Only Memory) serial numbers and exactly locating of the temperature data can be completed. Meanwhile, to reduce the cost and avoid complex network cabling in wired network, a distributed wireless tempreature and humidity monitoring system based on MCU and wireless networking is proposed.","PeriodicalId":253478,"journal":{"name":"2010 IEEE 12th International Conference on Communication Technology","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124356468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Impact of misbehaving users in the p-persistent IEEE 802.11 network under saturation condition","authors":"W. Srichavengsup","doi":"10.1109/ICCT.2010.5688613","DOIUrl":"https://doi.org/10.1109/ICCT.2010.5688613","url":null,"abstract":"In this paper, we investigate the impact of misbehaving users in the p-persistent IEEE 802.11 network under saturation condition. The objective of this paper is to evaluate the performance degradation of the p-persistent IEEE 802.11 protocol when disturbed by a small group of misbehaving users who do not conform to the agreed rules. Through mathematical analysis as well as computer simulations, it is found that the overall system throughput degraded even with the existence of only a few misbehaving users. Intensive investigations show that the level of performance degradation depends on two salient factors, the transmission probability of misbehaving users and the number of misbehaving users.","PeriodicalId":253478,"journal":{"name":"2010 IEEE 12th International Conference on Communication Technology","volume":"394 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127593421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}